An attacker socially engineered registrar EasyDNS into an account recovery flow for eth.limo, briefly gaining the ability to change the gateway’s nameservers overnight April 17–18. DNSSEC validation prevented attacker-controlled DNS answers from being accepted by validating resolvers, and eth.limo said it was not aware of any user impact at the time of its post-mortem.
The ENS-to-web gateway eth.limo suffered a registrar-layer takeover after an attacker manipulated EasyDNS support into running an account recovery process. The incident began at 7:07 p.m. EDT on April 17 when the attacker impersonated an eth.limo team member.
Control at the registrar level translated into control over DNS delegation. The attacker changed eth.limo’s nameservers to Cloudflare at 2:23 a.m. EDT on April 18, which triggered automated downtime alerts that woke the eth.limo team. The nameservers were switched again to Namecheap at 3:57 a.m. EDT. EasyDNS restored the team’s account access at 7:49 a.m. EDT, ending the window where the attacker could steer DNS settings.
EasyDNS CEO Mark Jeftovic publicly apologized, writing, “On behalf of everyone here, I apologize to the eth.limo team and the wider Ethereum community,” and added: “ENS has always had a special place in our heart as the first registrar to enable ENS linking to web2 domains and we’ve been involved in the space since 2017.” Jeftovic said it was the first successful social engineering attack against an EasyDNS customer in the registrar’s 28-year history and that no other customers were affected.
Eth.limo is a free, open-source reverse proxy that lets standard browsers load ENS-linked content hosted on IPFS, Arweave, or Swarm by appending “.limo” to a .eth name. That convenience is also the risk surface: EasyDNS cited that eth.limo’s wildcard DNS record at *.eth.limo covers roughly 2 million .eth domains registered through ENS.
In market terms, this is a classic “single choke point” problem. A successful wildcard hijack would not need to compromise any smart contract to create damage. It could redirect traffic for any .eth page accessed through the gateway, including high-visibility endpoints like vitalik.eth.limo, toward phishing infrastructure or wallet-drainer front ends. Even a short-lived nameserver flip matters when users are conditioned to click ENS links during fast-moving events.
The containment mechanism was DNSSEC, not luck. DNSSEC cryptographically signs DNS records so validating resolvers can reject unsigned or incorrectly signed responses.
Eth.limo said the attacker never obtained the domain’s signing keys. That meant when resolvers checked responses from the attacker-selected nameservers against the legitimate DS record still cached from the parent zone, the chain of trust broke. Instead of accepting attacker-controlled answers, validating resolvers returned SERVFAIL, effectively failing closed.
That framing matters for risk assessment. This was a registrar and process failure that allowed nameserver changes, not a cryptographic break of DNSSEC itself. Eth.limo’s team wrote: “DNSSEC likely reduced the blast radius of the hijack. We are not aware of any user impact at this time,” while acknowledging the practical outcome depends on resolver behavior.
EasyDNS said eth.limo will be migrated to Domainsure, an EasyDNS-affiliated service that does not offer any account recovery mechanism. The operational signal is clear: remediation is shifting away from “train support better” toward removing human recovery pathways that can be socially engineered.
Key unknowns remain. EasyDNS has not disclosed how the attacker passed the account recovery process, citing an internal post-mortem. There is also no quantified readout on edge-case impact from non-validating resolvers, even though eth.limo said it is not aware of user impact.
The broader pattern is unfavorable. Registrar and DNS-layer compromises have repeatedly targeted crypto front ends in recent months, including November DNS hijacks of Aerodrome and Velodrome that drained more than $700,000 after attackers compromised a registrar account and stripped DNSSEC from affected domains. Steakhouse Financial disclosed a similar incident on March 30 after support staff were socially engineered into removing two-factor authentication, briefly serving a wallet drainer from a cloned site, and Neutrl reported a similar March incident.
During this event, Vitalik Buterin warned users to avoid eth.limo URLs and pointed to IPFS as a workaround, telling followers they could “check my blog via IPFS directly,” before later confirming the situation was “all resolved now.” Whether more ENS and DeFi front ends adopt DNSSEC and publish clear incident-response paths like IPFS-direct access is the next practical test.
I treat this as a registrar-control incident that got stopped by the plumbing doing what it was designed to do. The threshold that matters is whether the ecosystem internalizes the lesson: DNSSEC can force failure instead of silent compromise, but only for users behind validating resolvers and only if attackers can’t strip DNSSEC like they did in prior front-end hits.
The real test is whether eth.limo actually lands on Domainsure with account recovery fully disabled and whether EasyDNS discloses the failure mode that let the attacker through. If those controls hold and more teams ship DNSSEC plus clear IPFS-direct playbooks, the setup starts to look structural rather than narrative-driven, which is what reduces wallet-drainer risk during the next volatility spike.

The attacker flipped eth.limo’s DNS twice overnight, but validating resolvers returned SERVFAIL without signing keys.